| 9886590 |
Techniques for enforcing application environment based security policies using role based access control |
Janaki Narasinghanallur, Thomas Keefe, Eric Sedlar, Chi Ching Chui, Vikram Pesati |
2018-02-06 |
| 9715528 |
Real-time data redaction in a database management system |
Javed Samuel, Peter Knaggs, Dah-Yoh Lim, Paul Youn |
2017-07-25 |
| 9495394 |
Pluggable session context |
Janaki Narasinghanallur, Eric Sedlar, Thomas Keefe, Chon Hei Lei, Vikram Pesati |
2016-11-15 |
| 8762406 |
Real-time data redaction in a database management system |
Javed Samuel, Peter Knaggs, Dah-Yoh Lim, Paul Youn |
2014-06-24 |
| 8549038 |
Pluggable session context |
Janaki Narasinghanallur, Eric Sedlar, Thomas Keefe, Chon Hei Lei, Vikram Pesati |
2013-10-01 |
| 7925023 |
Method and apparatus for managing cryptographic keys |
Paul Youn, Daniel ManHung Wong, Chon Hei Lei |
2011-04-12 |
| 7761704 |
Method and apparatus for expiring encrypted data |
Daniel ManHung Wong, Chon Hei Lei, Thomas Keefe |
2010-07-20 |
| 7639819 |
Method and apparatus for using an external security device to secure data in a database |
Paul Youn, Daniel ManHung Wong, Chon Hei Lei |
2009-12-29 |